Comparison of Cloud Security Services
Date: 2021.12.20
- 2021.12.20 Comparison of Cloud Security Services
Security software that builds a management server in a cloud environment to maintain security is called a “cloud-based” security service.
On the other hand, the conventional mainstream method is to build a system for security measures in the company’s server environment, which is called “on-premises.”
In recent years, an increasing number of companies are adopting “cloud-based” security services because they can flexibly use systems that support the latest environments and requirements, and can also expect cost reductions.
In addition to companies that already have a high share in security services, various other companies are also providing services.
This article explains the features of cloud-based security services, introduces major services for personal computers, and discusses comparison perspectives.

Table of Contents
- Differences Between On-Premises and Cloud Security Services
- Benefits of Cloud Security Services
- Perspectives for Comparing Cloud Security Services
- List of Major Cloud Security Services
- Summary
1. Differences Between On-Premises and Cloud Security Services
Traditionally, the mainstream security measure was to install security software on computers such as personal or internal servers, and data centers.
This type of security measure is called “on-premises.”
A typical on-premises security measure involves installing dedicated software on each computer and monitoring network traffic for each computer to prevent unauthorized access.
Virus pattern files that are released by security vendors from time to time are regularly downloaded to build the latest security environment on each computer.
On the other hand, with “cloud-based” security, security software is installed on a server environment built by a security vendor instead of the company’s own environment such as an in-house server.
A security system is built in the cloud environment between the Internet and each computer used by individuals, and various security measures are performed.
2. Benefits of Cloud Security Services
By adopting a cloud-based security service, various software for security measures can be removed from your company’s computers and servers.
This makes it possible to reduce costs such as regular maintenance, large-scale repairs and system updates every few years, and the risk of failure.
Furthermore, it becomes possible to update to the latest environment as needed without performing maintenance or updates, to use only as much as is needed when needed, and to flexibly change measures according to changes in the business environment, which was difficult to achieve with a uniquely built environment.
3. Perspectives for Comparing Cloud Security Services
When considering adopting a cloud-based security service, compare the following points:
3-1. Price
Many services have prices set on a monthly basis. The monthly fee increases or decreases depending on the number of years of the contract and the number of devices under contract.
Many services are priced around 5,000 yen to 10,000 yen.
3-2. Usage Environment
Many security vendors offer plans and service types that are based on the size of the company introducing the service.
In addition, many services publish their usage results on their website. You can also compare your company’s environment with the companies listed in the usage results to understand the scale of companies that are introducing the service in advance.
3-3. Ease of Use
Small companies may not have dedicated security staff and may be combining it with other duties.
Some security services are designed to be easy to use, such as realizing a system that can be managed even by people without specialized knowledge, or adopting an interface that is easy for anyone to understand.
It is a good idea to consider who will be using the service.
3-4. Support System
Support content varies depending on the service, such as “Is there 24-hour chat support?” or “Is telephone support available?”
It is important to check whether the necessary support is provided according to the environment in which it is used.

4. List of Major Cloud Security Services
Finally, here are some typical cloud security services for personal computers that are mainly offered to small and medium-sized businesses.
4-1. Virus Buster Business Security Services
URL: https://businessonline.trendmicro.co.jp/sb/vbbss/product.asp
Sales company: Trend Micro Incorporated
Price: Inquiry required
Number of licenses: 1 to the desired number
Supported PC OS: Windows, MacOS
Features: This is a cloud-based security software suitable for small and medium-sized enterprises. It is well-equipped with the security measures required by small and medium-sized enterprises.
This product is particular about both the “speed and defense power” that the field demands and the “ease of introduction and management” that administrators demand. It is supported by busy administrators who combine information security management with other tasks.
The number of installations can be flexibly changed from one to match increases or decreases in the number of employees.
4-2. Kaspersky Endpoint Security Cloud
URL: https://www.kaspersky.co.jp/small-to-medium-business-security
Sales company: Kaspersky Labs Japan Co., Ltd.
Price: Inquiry required
Number of licenses: 1 ~
Supported PC OS: Windows, MacOS
Features: This is a cloud-based security software for medium-sized companies (51 to 999 people). It is characterized by its ease of understanding that even people in charge who do not have advanced IT skills can manage it.
Another feature is its high detection accuracy.
The number of installations can be flexibly changed from one to match increases or decreases in the number of employees.
4-3. ESET PROTECT Entry Cloud
URL: https://eset-info.canon-its.jp/business/ep-entry-c/
Sales company: ESET Japan Co., Ltd.
Price: 5,950 yen/year (per license for 6-10 licenses)
Number of licenses: 6 ~
Supported PC OS: Windows, MacOS, Linux
Features: This is a cloud security solution that supports multiple platforms and also supports Linux.
It is equipped with various security functions required for endpoints, such as anti-malware, network protection, and anti-spam measures, and its light operation, high detection power, and low false positive rate have been highly evaluated by evaluation organizations.
4-4. EXO Security
URL: https://exosp.net/
Sales company: JIRAN JAPAN Co., Ltd.
Price: 5,000 yen/month (excluding tax, unlimited use for up to 50 users)
Number of licenses: 1 ~
Supported PC OS: Windows, MacOS
Features: This is a cloud-based comprehensive endpoint security software for corporations. Since it is cloud-based, it does not require a dedicated server and is managed by a web-based system.
The basic function is an anti-malware function based on Avira’s vaccine engine, which protects against viruses and ransomware, and provides security measures such as blocking access to malicious sites.
If necessary, you can also add options to deal with information leakage measures such as detecting unencrypted personal information and controlling file storage to external storage.

Summary
In recent years, remote work has become commonplace, and employees are increasingly taking their computers outside of the office or to their homes to work.
For this reason, endpoint security that can handle not only security measures that collectively manage networks and each employee’s computer on a company server basis, but also security measures outside the company has become important.
EXO Security, a comprehensive endpoint security solution, supports both anti-virus and information leakage prevention, so you can achieve all-in-one security by introducing it.
Furthermore, since it is a cloud-based endpoint security, you can first feel free to use only the basic anti-virus measures, and then add information leakage measures such as external storage storage control and mandatory encryption as needed.
Virus Countermeasure Security Software “EXO Security”
Click here for EXO Security usage fees
Click here for EXO Security features